The ZeroTrace stack
Six layers, sold separately, designed to compose. A freelance pentester, a 30-student lab, and an internal red team all run the same workflow at different scales.
Each layer is a real product
Pick the ones you need. Add the rest later. Same trust model at every layer.
HID hardware
Hand-assembled in Germany. Ghost, Mini, BLELogger. Plug, run, unplug. No phone-home.
Browse devicesFirmware
Lifetime updates. Web UI, live script editing, recon and self-destruct modes. Same kit works the same way next year.
View firmwareCompanion app
Pair, configure, monitor. Runs on your machine — not a vendor cloud. Dashboard + integrated terminal.
See the appOSINT toolkit
70+ tools across 11 categories. Free public sources only. Investigation profiles export to PDF.
Open OSINTProxy suite
Extraction, checking, leak testing, chain & rotation. Rounds out the testing pipeline without third-party SaaS.
Open ProxyLab program
Pre-packaged HW + software + curriculum for universities, training providers, internal red teams.
Explore labsHow an engagement runs through the stack
Each step uses one or two layers. The artefacts move forward.
Recon
OSINT investigation profiles · target enumeration
Plan
Companion app · script editor · scope letter
Execute
HID hardware + firmware · payload run · captures
Validate
Proxy chain testing · leak checks
Report
OSINT PDF export · evidence handoff
Three principles, end to end
The brand floor isn’t a marketing line — it shows up the same way at every layer.
Tools you own
One purchase, lifetime updates, no cloud account that has to stay alive for the device to work.
Made in Germany, no logs
Hand-assembled in the EU. Customer operational data never leaves your machine.
One workflow, sold as parts
Each layer is a real product you can buy on its own. They are designed to compose, not to lock you in.